Professional Documents
Culture Documents
Nyamnjoh - ICTs As Juju
Nyamnjoh - ICTs As Juju
Nyamnjoh - ICTs As Juju
FRANCIS B. NYAMNJOH
University of Cape Town
ABSTRACT KEYWORDS
In this article,1 I liken information and communication technologies (ICTs) or digi- digital humanities
tal technologies to what we in West and Central Africa have the habit of referring ICTs
to as Juju. I invite as scholars of the digital humanities to see in the region’s belief digital technologies
in incompleteness and the compositeness of being human, as well as in the capac- Juju
ity to be present everywhere at the same time an indication that we have much to Africa
learn from the past on how best to understand and harness current purportedly incompleteness
innovative advances in ICTs. The idea of digital technologies making it possible compositeness
for humans and things to be present even in their absence and absent even in their spyware
presence is not that dissimilar to the belief in what is often labelled and dismissed
as witchcraft and magic that lends itself to a world of infinite possibilities – a 1. This article is an
improved version of
world of presence in simultaneous multiplicities and eternal powers to redefine a paper delivered as a
reality. The article argues in favour of incompleteness as a normal way of being. It Keynote Address at the
challenges students of humanity to envisage a relationship between humans and 2019 Digital Humanities
Conference on the
digital technologies that is founded less on dichotomies and binary oppositions,
www.intellectbooks.com 279
Francis B. Nyamnjoh
theme of ‘Complexities’, nor on zero-sum games of conquest and superiority. If humans are present in
Utrecht University, The
Netherlands, 9–12 July
things and things in humans, thanks to the interconnections, the flexibility and
2019. fluidity of being that come with recognition of and provision for incompleteness, it
is important to see things and humans not only as intricately entangled, but also
as open-ended composites.
ON INCOMPLETENESS
I am Francis Beng, I presume, Nyamnjoh. I was born, I presume, without
any of such labels that I have been assigned or have acquired through my
life journeys and in my encounters with others – individuals, cultures, world-
views, belief systems and modes of social organization and practice. I grew
up in West and Central Africa where we believe, organize and conduct our
lives around the idea that everything in the world and in life is incomplete:
nature is incomplete, the supernatural is incomplete, Humans are incomplete,
and so is human action and human achievements. We believe that the sooner
one recognizes and provides for incompleteness as the normal way of being,
the better we are for it. We also believe that because of their incompleteness,
people are not singular and unified in their form and content, even as their
appearance might suggest that they are. And so are things. Fluidity, compos-
iteness of being and the capacity to be present in simultaneous multiplicities
in whole or in fragments are a core characteristic of reality and ontology of
incompleteness. West and Central Africa is a region where interconnections
and interdependencies are recognized and celebrated, and used as the domi-
nant and desired template for organizing relationships among humans, and
between humans and the natural and supernatural worlds.
It is in recognition of incompleteness that humans in West and Central
Africa are ever so eager to seek ways of enhancing themselves through rela-
tionships with other humans, and in using their creativity and imagination to
acquire magical objects that can extend themselves in their relationships with
fellow humans and with the whims and caprices of natural and supernatural
forces/agents. Such magical objects, which in the language of modernity are
referred to as technologies, are more commonly known in West and Central
Africa under local names that I have roughly translated as Juju. The cosmolo-
gies and ontologies that lend themselves to such beliefs and practices have in
the past been, and still largely continue to be mischaracterized and disparaged
as witchcraft, sorcery, paganism, superstition and primitivism. Paradoxically,
not even the currency of new information and communication technologies
(ICTs) championed by the digital revolution is seen as a redeeming factor for
such cosmologies and ontologies, beliefs and logics of practice.
Yet, ambitions of dominance and superiority through conquest and
refusal to acknowledge debt and indebtedness aside, it becomes evident
that the future belongs with such disregarded popular beliefs and practices
informed by the reality of incompleteness. If the ordinary human at the state
of nature is incomplete, all efforts at seeking to enhance themselves through
relationships with fellow humans and through borrowings and technolo-
gies, far from making them complete, points them to the humility of being
composite and in acknowledging and providing for their debts and indebt-
edness to others – humans, nature and the supernatural. Incompleteness
is an enduring condition in that, the quest for extensions in order to repair
www.intellectbooks.com 281
Francis B. Nyamnjoh
the wife he had set out to win, the man began the process of self-deactivation
by returning all the things and body parts that he had borrowed for the occa-
sion and paying the price he had agreed with the lender. The bride learned
too late how deceptive appearances sometimes are. If only the ‘Complete
Gentleman’ was not so much of a gentleman as to insist on recognizing and
paying back the debt of things and body parts he owed others, he just might
have continued to live a lie.
What does this teach us about the relationship between digital tech-
nologies and humans? The story invites us, as scholars of humanity and its
extensions, to emphasis interconnections and interdependencies, in our
perspectives. The story invites us to embrace incompleteness as a normal state
of being and becoming, by systematically disabusing ourselves of zero-sum
aspirations to superiority. It invites us as humans to embrace and relate to
technologies as things and relationships that supplement us as much as they
uncomplete us. It is an invitation to see the relationship between humans and
technologies as a non-linear conversation on the entanglements or intricacies
between change and continuity, nature and culture, past and present, tradition
and modernity, the human and the non-human.
in myriad ways holds great promise for theorizing the intersections between
humans and ICTs.
Juju, as used in this address, is a technology of self-activation and self-
extension – something that enables us to rise beyond our ordinariness of
being, by giving us potency to achieve things that we otherwise would fall
short of achieving, were we to rely only on our natural capacities or strengths.
It is true that our bodies, if well cultivated, could become phenomenal Juju,
enabling us to achieve extraordinary feats. But even such technically trained,
programmed or disciplined bodies are likely to encounter challenges that
require added potency. In other words, while our bodies have the potential
to be our first Juju, they eventually require additional Juju for us to be effica-
cious in our actions. As we have gathered from the example of the Complete
Gentleman above, the writings of Amos Tutuola and the universes he depicts
are replete with examples how humans, the natural and supernatural worlds
summon creativity and imagination through Juju to interact with one another,
and to make evident that no single agent (human or non-human) is free of or
has the monopoly of incompleteness.
Any of us remotely familiar with Amos Tutuola’s writings would know
what I mean by Juju, as well as understand the ubiquitous presence of Juju in
the universes which Tutuola choreographs and depicts. The same is true with
those of us familiar with social life in West and Central Africa. The follow-
ing passage, from Tutuola’s novel, The Witch-Herbalist of the Remote Town, on
how the brave hunter of the Rocky Town prepares for the long and dangerous
journey to see the Witch-Herbalist of the Remote Town for a cure to his wife’s
barrenness, captures remarkably the centrality of Juju as a great activator in
Tutuola’s universe and its rites of passage:
I entered my room and I first drank one keg of the palm-wine. Then I
wore my hunting dress, I wore many kinds of Juju in my loin, I wore
many on my neck, both on my elbows and limbs. Several others which
were the skulls of snakes, birds of prey, lizards, etc. were tied on my
huge cap and I put it on my head. Having dressed like that, I took my
bow and the poisonous arrows. Many kinds of Juju were tied on every
part of the bow as well. Then I hung the bow and arrows and my long
and heavy matchet on my left shoulder. Then I put the Juju ring which
could make a person invisible on one of my left fingers.
[…] Having equipped myself like that, again I drank one keg of the
palm-wine […] then I staggered from my room to the outside of the
house […].
As I knelt down before the people, and as I began to shake from feet
to head for the intoxication of the powers of all the Juju which I wore
and as well for the power of the strong palm-wine which I had drunk in
the room, so they all prayed for me. After the prayer, each of the people
including my mother, father, my wife, her mother and her father, hung
several kinds of Juju gourds all over my dresses, head, neck, breast, loin,
etc. After all these Juju gourds were offered, I did not waste time at all
but I stood up and I started my journey immediately.
(Tutuola 1981: 23–24)
www.intellectbooks.com 283
Francis B. Nyamnjoh
www.intellectbooks.com 285
Francis B. Nyamnjoh
The operator of the software can track you with your GPS […] They can
turn the microphone and camera on at any point and record everything
that’s happening around you. It steals access to every social media app
you have; it steals all your pictures, your contacts, your calendar infor-
mation, your email, every document you have. […] It literally turns your
phone into a listening device that they can track you with – and it steals
everything on it.
(‘The spy in your pocket’ 2019)
Such spyware makers are not dissimilar to a spirit medium in the bushes of
West and Central Africa drumming their clients and protégés into intoxicating
frenzies of fearless overindulgence in full view.
These developments are confirmed and expanded upon by Edward
Snowden, the whistleblower American computer systems administrator who
stole classified information from the National Security Agency and passed it to
the press, and who subsequently escaped into exile in Russia. In an interview on
16 September 2019 with Brian Williams, the host of MSNBC’s ‘The 11th Hour’
on the eve of the release of his book Permanent Record, Snowden acknowl-
edges that ‘hacking has increasingly become what governments consider
a legitimate investigative tool’ (Snowden 2019: n.pag.). Governments, he
argues, ‘use the same methods and techniques as criminal hackers’ (Snowden
2019: n.pag.). They seek ‘to remotely take over’ (Snowden 2019: n.pag.) the
electronic devices of their citizens and those they spy on by detecting and
taking advantage of vulnerabilities in the software of the electronic devices
used by the citizens and targets in question. Once a government successfully
hacks its way into the device of the target, they are able to remotely launch
and control the device, and are able to do with it, remotely, anything that the
rightful owner of the device can do. ‘They can read your email, they can collect
every document, they can look at your contact book, they can turn the location
services on, they can see anything’ (Snowden 2019) that is on one’s phone,
laptop or tablet. Snowden adds that sometimes governments do not need to
hack devices directly, if they have the collaboration of big technology compa-
nies (Snowden 2019).
They can simply ask Google for a copy of our e-mail box because Google
saves a copy of that. Everything that you ever typed into that search box,
Google has a copy of. Every private message that you’ve sent on Facebook,
every link that you’ve clicked, everything that you’ve liked they keep a perma-
nent record of. And all of these things are available not just to these companies
but to our governments as they are increasingly deputized as sort of miniature
arm of government (Snowden 2019).
Snowden illustrates such government spying on their citizens and critics
in response to a question on the role of government hacking and tracking of
electronic devices in the brutal murder of Jamal Khashoggi, ‘a Washington Post
Reporter and a primary critic of the Saudi regime’ (Snowden 2019). According
to Snowden, the government of Saudi Arabia managed to hack the phones
and related devices of its critics with technology that ‘they purchased […]
from a digital arms broker company called the NSO group, an Israeli company’
(Snowden 2019) that specializes in the ‘manufacture of digital weapons’
(Snowden 2019) or ‘hacking tools that can be used against the critical infra-
structure that all of us rely on, the phones in our pockets’ (Snowden 2019).
NSO ‘sell this capability to break into phones of people around the world for
millions and millions of dollars to some of the worst governments on earth’
(Snowden 2019), and with little to no oversight or ethical considerations.
According to Snowden, the Saudi government could not have harnessed the
knowledge on Jamal Khashoggi to act the way they did, without the assistance
of such technology (Snowden 2019):
When they are not at the service of repressive governments and states, spyware
makers collaborate with the big technology corporations to mutually enhance
their potency economically, often to the detriment of individuals who will-
ingly and unsuspectingly deliver themselves, their personal data and privacy
to be preyed upon. Both the high-tech companies and their spyware suppliers
depend on algorithms that, as Snowden puts it, ‘are fuelled by precisely the
www.intellectbooks.com 287
Francis B. Nyamnjoh
innocent data that our devices are creating all of the time, constantly, invisibly,
quietly’ (Snowden 2019). Both spyware makers and dealers in data basically
make money by monitoring and monetizing the privacy of the users of various
social media platforms and digital consumer applications. By way of example,
Facebook clients such as the now defunct Cambridge Analytica are able to use
the facts gathered from the browsing histories of Facebook users to create a
web of disinformation online, inviting those entrapped to click on things that
make them think things are happening, when it is actually an invitation to live
in a truthless (post-truth or post-consensus) world, available and amenable
to being manipulated ad infinitum by the hidden persuaders who control the
algorithms that make that world possible. Thanks to the algorithms at work
non-stop, the everyday communicative activities of people the world over with
access to any networked electronic device are being meticulously recorded,
processed and placed at the disposal of advertisers and other seekers after
total control of humans, mind, body and soul.
In a speech at the United Nations on 24 September 2019, British Prime
Minster Boris Johnson expressed a similar concern with what he termed the
growing ‘Digital authoritarianism’ (NS Tech 2019) of the digital age. According
to Johnson, ‘in future there may be nowhere to hide’ (NS Tech 2019) if current
practices by big Tech companies are not regulated and controlled. Using
Google as an example, he argued: ‘[y]ou may keep secrets from your friends,
from your parents, your children, your doctor – even your personal trainer –
but it takes real effort to conceal your thoughts from Google’ (NS Tech 2019).
Johnson spoke of a future at the mercy of a ‘great cloud of data that lours ever
more oppressively over the human race’ (NS Tech 2019) in the following terms
(NS Tech 2019):
Smart cities will pullulate with sensors, all joined together by the ‘inter-
net of things’, bollards communing invisibly with lamp posts
So there is always a parking space for your electric car, so that no bin
goes unemptied, no street unswept, and the urban environment is as
antiseptic as a Zurich pharmacy.
But this technology could also be used to keep every citizen under
round-the-clock surveillance.
A future Alexa will pretend to take orders.
But this Alexa will be watching you, clucking her tongue and stamping
her foot
In the future, voice connectivity will be in every room and almost every
object: your mattress will monitor your nightmares; your fridge will
beep for more cheese, your front door will sweep wide the moment you
approach, like some silent butler; your smart meter will go hustling – if
its accord – for the cheapest electricity.
And every one of them minutely transcribing your every habit in
tiny electronic shorthand, stored not in their chips or their innards –
nowhere you can find it, but in some great cloud of data that lours ever
more oppressively over the human race
A giant dark thundercloud waiting to burst and we have no control over
how or when the precipitation will take place and every day that we tap
on our phones or work on our iPads – as I see some of you doing now
– we not only leave our indelible spoor in the ether.
(NS Tech 2019)
To Snowden, ‘[t]hese activity records are being created and shared and collected
and intercepted constantly by companies and governments’ (Snowden 2019).
What is actually being collected and sold, he argues, is more than just infor-
mation: ‘what they’re selling is us, they’re selling our future they’re selling our
past, they’re selling our history, our identity, and ultimately they’re stealing
our power and making our stories work for them’ (Snowden 2019). This is
evidence not only of the manipulability of social media, but also of the fact
that the cheap and affordable delivery of goods and services made possible by
social media come at great costs to privacy and individual freedoms. With digi-
tal technologies in a context of zero-sum games of power, opportunities come
with opportunism. Just as people employ digital technologies to extend them-
selves and establish intimacies, so too are the very same technologies actively
employed to distant people from collective ways of thinking and doing that
they have internalized and naturalized.
www.intellectbooks.com 289
Francis B. Nyamnjoh
REFERENCES
Achebe, C. ([1964] 1974), Arrow of God, African Writers Series, Oxford:
Heinemann.
NS Tech (2019), ‘“A giant dark thundercloud of data”: Read Boris Johnson’s
UN speech in full’, NS Tech, 24 September, https://tech.newstatesman.
com/policy/boris-johnsons-un-speech. Accessed 29 September 2019.
Nyamnjoh, F. B. (2017), Drinking from the Cosmic Gourd: How Amos Tutuola Can
Change Our Minds, Bamenda: Langaa.
Snowden, E. (2019), interviewed by Brian Williams, the host of MSNBC’s ‘The
11th Hour’, Monday 16 September, https://www.nbcnews.com/msnbc/
news/edward-snowden-says-government-your-phone-insists-he-only-
wanted-n1055171. Accessed 17 September 2019.
‘The spy in your pocket’ (2019), File on 4, BBC Radio 4, UK, 16 June, 5 p.m.
Tutuola, A. (1952), The Palm-Wine Drinkard, London: Faber and Faber.
——— (1954), My Life in the Bush of Ghosts, London: Faber and Faber.
——— (1981), The Witch-Herbalist of the Remote Town, London: Faber and
Faber.
SUGGESTED CITATION
Nyamnjoh, F. B. (2019), ‘ICTs as Juju: African inspiration for understanding
the compositeness of being human through digital technologies’, Journal
of African Media Studies, 11:3, pp. 279–291, doi: 10.1386/jams_00001_1
CONTRIBUTOR DETAILS
Francis B. Nyamnjoh is a professor of social anthropology at the University of
Cape Town. His most recent publications relevant to the theme of this address
are: Drinking from the Cosmic Gourd: How Amos Tutuola Can Change Our Minds
(2017), and The Rational Consumer: Bad for Business and Politics: Democracy at
the Crossroads of Nature and Culture (2018).
Contact: Anthropology Section, University of Cape Town, 5.23 AC Jordan
Building Private Bag X3, Rondebosch 7701, Cape Town, South Africa.
E-mail: Francis.Nyamnjoh@uct.ac.za; nyamnjoh@gmail.com
https://orcid.org/0000-0002-4702-8874
Francis B. Nyamnjoh has asserted his right under the Copyright, Designs and
Patents Act, 1988, to be identified as the author of this work in the format that
was submitted to Intellect Ltd.
www.intellectbooks.com 291